logo
ArticlesAbout
Register | Login
Research Article
JUCS - Journal of Universal Computer Science 19(10): 1351-1374
https://doi.org/10.3217/jucs-019-10-1351 (28 May 2013)
Other versions:
XML
PDF
 
 
Twitter
Facebook
Mendeley
Reddit
Notify a colleague
  • Article InfoArticle Info
  • CitationCitation
  • MetricsMetrics
  • CommentComment
  • RelatedRelated
  • CitedCited
JUCS - Journal of Universal Computer Science 19(10): 1351-1374
doi: 10.3217/jucs-019-10-1351
Received: 06 Mar 2012 | Approved: 29 Mar 2013 | Published: 28 May 2013
This article is part of:
JUCS - Journal of Universal Computer Science 19(10)
Authors
Jia Fan - Corresponding author
Science and Technology on Communication Security Laboratory, Chengdu, China
Articles by this author in:  CrossRef  |  Google Scholar
Yuliang Zheng
University of North Carolina at Charlotte, Charlotte, United States of America
Articles by this author in:  CrossRef  |  Google Scholar
Xiaohu Tang
Southwest Jiaotong University, Chengdu, China
Articles by this author in:  CrossRef  |  Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This article is freely available under the J.UCS Open Content License.
Powered by

This website uses cookies in order to improve your web experience. Read our Cookies Policy

OK